Protecting Your Computer and Your Identity

Total Page:16

File Type:pdf, Size:1020Kb

Protecting Your Computer and Your Identity Protecting Your Computer and Your Identity Security Awareness Office of Enterprise Security Department of Information Technology August 2007 1 Table of Contents Why Protect Your Computer 3 Viruses, Worms, and Trojans 4 Spyware 6 Spam 8 Phishing 9 Pharming 11 Firewalls 12 Internet Frauds and Scams 14 Avoiding Online Predators 16 Cyber Bullying 18 Identity Theft 20 2 Why Protect Your Computer If you have a computer that connects to the internet then protecting your computer is crucial. Your computer is not only prone to viruses, spyware and other unwanted traffic including theft of information from your computer, but can also be used for criminal or spamming purposes by hackers. It is common to think that it is not required to protect your computer if you don't have any important data in it. This misconception should be overcome as hackers can use your computer as a scapegoat to launch attacks, commit criminal acts, and send out spam hiding from within your computer, for which you may be held responsible. Your computer has more information and resources that can be useful to hackers than you think. Protect your computer as much as possible by setting various layers of security boundaries. 3 Viruses, Worms, and Trojans A virus is a program that can cause damage to a computer and can replicate itself in a computer and over the network or internet. Virus code is usually buried within the code of another program. Once executed, the virus gets activated and spreads in the system. Viruses and other types of malicious code are often spread as attachments to email messages. Before opening any attachments, be sure you know the source of the attachment. It is not enough that the email originated from an address you recognize. The Melissa virus spread rampantly because it originated from a familiar address. If files from an infected computer are sent as email attachments, it also infects the computer in which the attachment is opened. A virus can corrupt or delete files or make a computer unusable. Worm: A self-contained program (or set of programs) that is able to spread copies of itself to other computer systems. The propagation usually takes place through network connections or email attachments. Trojans: A program that neither replicates nor copies itself, but performs some illicit activity when it is run. It stays in the computer doing its damage or allows somebody from a remote site to take control of the computer. Trojans often sneak into your system attached to a free game. Tips: • Install anti-virus software o Anti-virus tools remain one of the easiest and most comprehensive defenses against malicious code. o You can purchase tools such as Norton AntiVirus or McAfee VirusScan, or there are also free tools such as AntiVir Personal Edition. o You should have your anti-virus software installed on your computer before connecting to the internet. o Make sure to keep it updated. • Install a Firewall o A firewall will give you an extra layer of protection between your computer and the internet helping to stop incoming attacks. • Update Windows and your browser regularly o Windows and browser will often have security holes, vulnerabilities, which need to be patched before hackers can use them to access to your computer. • Keep your browser security at Medium or High o The Medium security level contains dozens of tweaks that block common virus propagation techniques. 4 o The High setting goes even further, but it may prevent you from viewing legitimate sources. • Don’t install “search-help bars” in your browser o Many of these search helpers are used to invade your computer and steal your information. o Not all of these search helpers are untrustworthy. Google and Yahoo! Are ok. You just need to be careful with who you put your trust in. • Don't run executable email attachments, even if sent by a friend. o Most worms today spread by infecting a machine and launching a mass email attack. You can stop that attack vector and protect your friends by not running attachments. o If you get an attachment you really want to open, save it to your hard drive, run a virus scan, and then open it if it is clean. 5 Spyware Spyware is a means of eavesdropping and can be installed on the computer without the user's knowledge or consent by just going to the wrong website. This happens when the website executes a script on the computer (if you have not disabled scripts). Specifically, spyware is computer software that contains surveillance tools that can monitor keystroke activity, take screen snapshots, do email and chat-logging, gather information about the computer user and the user's information and reports it back to the requesting server. The threats for loss of personal confidential information and identity theft are very real. Most spyware come bundled with free programs that you download from the internet. Almost all file sharing applications come loaded with spyware and may also have the ability to download and install more spyware. Before you download free software from the internet, read the policies if available, and determine why it is being given for free. It is a good practice not to download anything from the internet that you do not know about and/or do not trust. Spyware is also responsible for browser hijacking leading to changing your home page on your browser. For example, if you are planning a Florida vacation, you may be surprised to see relevant ads on travel deals to Florida as pop-ups, emails or other messages. This happens because your internet activities are being monitored by the spyware. If your computer is infected with spyware, the information you transmit over the internet is captured and you will get targeted for ads. Spyware programs run in the background of your computer without your knowledge and decrease processor performance and memory and eventually slow the overall performance of your computer. Spyware is not classified as a virus and anti-virus programs do not block it. Spyware requires specific tools to identify and remove the spyware. Spyware is also sometimes referred to as adware. There are many good spyware tools available. Tips: • Update Windows and your browser regularly o Windows and your browser will often have security holes, vulnerabilities, which need to be patched before hackers can use them to access to your computer. • Increase your security settings o Windows and browsers have I wide range of security settings to choose from in order to avoid spyware. It is a good idea to check their website for tips and ideas. 6 • Carefully read User Agreements before accepting o Always check to see if there will be other software installed. It will often tell you in the User Agreement. • Watch out for Windows warning boxes that look like advertisements o Spyware developers with often try to trick you by creating pop-ups that look like windows warning boxes. o You should just “X” out the box instead of clicking either Yes or No because both will result in spyware being loaded on to your computer. • Be cautious when installing free programs or shareware o Programs that are given away for free will often contain spyware that the author has installed in order to turn a profit. o Not all free software contains spyware, just be careful when you are choosing programs to download. • Install spyware detecting software • Install a Firewall o A firewall will create an extra layer of protection between the internet and your computer which will help to keep out intruders and spyware programs. 7 Spam Spam is unsolicited junk email sent to a large number of people, usually for advertising or marketing on the internet. The act of doing this is called spamming and the people who do this are called spammers. Spammers collect email addresses from various sources and also buy from companies which share email addresses. Spam emails may have a link to click in order to unsubscribe from their email list. It is not recommended to click on those links as that would only confirm your email address and cause more spam to be sent. It is a good idea to filter spam email addresses from reaching your inbox or report them as spam to your email service provider. Tips: • Limit who you give your personal email address to o Only give your personal email address to family, friends, or business associates. o When registering your email online, read the privacy policy to make sure that your email address cannot be sold to a third party. o Never display your email openly online. o Create separate email accounts for public use. • Watch for bad spelling and grammar o Spammers will often make spelling and grammar mistakes that would otherwise be picked up by a legitimate company’s proofreader. o They may also misspell words in order to get passed your spam filter. • Don’t respond to any spam o Do not try to unsubscribe to the emails, it will be unlikely to stop the emails unless the email that you received required a subscription. • Make good use of spam blockers o Check your internet service provider for spam blocking utilities it may offer. o Many email clients come with features that allow you to block emails from unwanted sources. • Reporting spam o The United States has the Controlling the Assault of Non-Solicited Pornography and Marketing Act. o To report spam you should forward a copy of the e-mails to [email protected]. 8 Phishing Phishing is a criminal activity using different variations of social engineering techniques.
Recommended publications
  • Adware-Searchsuite
    McAfee Labs Threat Advisory Adware-SearchSuite June 22, 2018 McAfee Labs periodically publishes Threat Advisories to provide customers with a detailed analysis of prevalent malware. This Threat Advisory contains behavioral information, characteristics and symptoms that may be used to mitigate or discover this threat, and suggestions for mitigation in addition to the coverage provided by the DATs. To receive a notification when a Threat Advisory is published by McAfee Labs, select to receive “Malware and Threat Reports” at the following URL: https://www.mcafee.com/enterprise/en-us/sns/preferences/sns-form.html Summary Detailed information about the threat, its propagation, characteristics and mitigation are in the following sections: Infection and Propagation Vectors Mitigation Characteristics and Symptoms Restart Mechanism McAfee Foundstone Services The Threat Intelligence Library contains the date that the above signatures were most recently updated. Please review the above mentioned Threat Library for the most up to date coverage information. Infection and Propagation Vectors Adware-SearchSuite is a "potentially unwanted program" (PUP). PUPs are any piece of software that a reasonably security- or privacy-minded computer user may want to be informed of and, in some cases, remove. PUPs are often made by a legitimate corporate entity for some beneficial purpose, but they alter the security state of the computer on which they are installed, or the privacy posture of the user of the system, such that most users will want to be aware of them. Mitigation Mitigating the threat at multiple levels like file, registry and URL could be achieved at various layers of McAfee products. Browse the product guidelines available here (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described in the Characteristics and symptoms section.
    [Show full text]
  • A Crawler-Based Study of Spyware on the Web
    A Crawler-based Study of Spyware on the Web Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, and Henry M. Levy Department of Computer Science & Engineering University of Washington {anm, tbragin, gribble, levy}@cs.washington.edu Abstract servers [16]. The AOL scan mentioned above has provided simple summary statistics by directly examining desktop in- Malicious spyware poses a significant threat to desktop fections [2], while a recent set of papers have considered security and integrity. This paper examines that threat from user knowledge of spyware and its behavior [6, 29]. an Internet perspective. Using a crawler, we performed a In this paper we change perspective, examining the na- large-scale, longitudinal study of the Web, sampling both ture of the spyware threat not on the desktop but from an executables and conventional Web pages for malicious ob- Internet point of view. To do this, we conduct a large-scale jects. Our results show the extent of spyware content. For outward-looking study by crawling the Web, downloading example, in a May 2005 crawl of 18 million URLs, we found content from a large number of sites, and then analyzing it spyware in 13.4% of the 21,200 executables we identified. to determine whether it is malicious. In this way, we can At the same time, we found scripted “drive-by download” answer several important questions. For example: attacks in 5.9% of the Web pages we processed. Our analy- sis quantifies the density of spyware, the types of of threats, • How much spyware is on the Internet? and the most dangerous Web zones in which spyware is • Where is that spyware located (e.g., game sites, chil- likely to be encountered.
    [Show full text]
  • (Fake Websites) Spam, Phishing and Pharming Are All Terms Relating to Dubious
    Spam (Junk email and Phishing email) and Pharming (fake websites) Spam, phishing and pharming are all terms relating to dubious online practices, either to sale goods or services online or to gain access to confidential information, often with malicious intent. Spam is the term used to describe unwanted (junk) emails that are typically distributed in bulk. Spam messages will typically contain commercial content – examples include pornography, pharmaceuticals, dubious financial transactions, or ‘too good to be true’ offers. In most cases, spam emails are sent with fraudulent intent, but there are also cases where reputable companies or private users send mass emails too. An example of Junk email: (to many recipients, requesting a response) Spam can also be used to launch phishing attacks where users are sent emails tricking them into ‘updating’ their personal details online via a fake website (imitating a bank or similar). The tricky part is that phishers pretend to be someone you know, like a bank or even a department from right here at Purdue, to make you think they are trustworthy. That’s why it’s so important to keep in mind that CLA-IT or any other Purdue department will NEVER, under any circumstance, ask you for your login information via email or web form. Anyone asking for this type of information via email is undoubtedly a fraud. Spam can also be used as a means of distributing malicious software, which can install key-logging software on your PC without your knowledge. Pharming is the term used to describe the process of redirecting users to a fraudulent copy of a legitimate website, again with the aim of stealing personal data and passwords for criminal intent.
    [Show full text]
  • Tip – How to Do Basic Browser Housekeeping?
    Tip – How to do basic browser housekeeping? Why do you need to do basic browser housekeeping? In order to prevent browser hijacking by ads, spams and re-directs, we encourage you to reset your web browser often. Please Note: After you reset your browser, all your saved password will be gone. Please make sure you record your password somewhere else safely. _______________________________________________________________________________________ Reset Internet Explorer Click on Tools and select Internet Options . Click on the Advanced tab. Click on the Reset button. _______________________________________________________________________________________ Reset Chrome Click on Customize and control Google Chrome button. Click on Settings . Click on Advanced Settings. Click on the Reset and Clean up button. Phone: (03) 8664 7001 Free Call: 1800 629 835 Fax: (03) 9639 2175 www.kindergarten.vic.gov.au [email protected] State Library of Victoria, 328 Swanston St, Melbourne, VIC 3000 Australia The Kindergarten IT Program is supported by the Victorian Government. Reset Firefox In the address bar of the FireFox type in about:support and hit Enter. Click Refresh Firefox… button. A window will appear showing the details of this action. Click Refresh Firefox button. _______________________________________________________________________________________ Clear website data in Safari Click on Safari tab and select Preferences… Click Privacy tab. Click Manage Website Data… Click on Remove All . Phone: (03) 8664 7001 Free Call: 1800 629 835 Fax: (03) 9639 2175 www.kindergarten.vic.gov.au [email protected] State Library of Victoria, 328 Swanston St, Melbourne, VIC 3000 Australia The Kindergarten IT Program is supported by the Victorian Government. Reset Edge Click on Settings and More button.
    [Show full text]
  • COVID-19 Updates and Resources for Local Governments G Tuesday, March 23, 2021 Welcome Greeting
    COVID-19 Updates and Resources for Local Governments g Tuesday, March 23, 2021 Welcome Greeting Kayla Rosen Departmental Analyst, Community Engagement and Finance, Department of Treasury 2 Tools and Resources for Local Governments: 11th Webinar Tuesday, March 23, 2021 – 2 p.m. – 3 p.m. I. Welcome & Introductions Heather Frick, Bureau Director, Bureau of Local Government and School Services, Michigan Department of Treasury I. Treasury Update a. CARES Act Grant b. FDCVT Grant c. Overviews of Recreational Marijuana Payments d. American Rescue Plan Eric Bussis, Chief Economist and Director of the Office of Revenue and Tax Analysis, Michigan Department of Treasury I. Cybersecurity for Local Governments Derek Larson, Acting Deputy Chief Security Officer, Department of Technology, Management and Budget (DTMB) I. Question and Answer II. Closing Remarks Heather Frick, Bureau Director, Bureau of Local Government and School Services, Michigan Department of Treasury 3 Welcome & Introductions Heather Frick Bureau Director, Bureau of Local Government and School Services, Department of Treasury 4 Treasury Local Government Funding Update Eric Bussis Chief Economist and Director Office of Revenue and Tax Analysis Michigan Department of Treasury 5 Treasury Update • CARES Act Grant • FDCVT Grant Agenda • Overviews of Recreational Marijuana Payments • American Rescue Plan 6 First Responder Hazard Pay Premiums Program (FRHPPP) • Payments made to 740 applicants, supporting approximately 37,500 first responders • 97 applications were selected for further federal
    [Show full text]
  • Component 3 Learning Aim B Cyber Security- B1 Threats to Data Why Systems Are Attacked
    Component 3 Learning Aim B Cyber Security- B1 Threats to Data Why Systems are Attacked Key Vocabulary Intellectual Property An idea that you invented that belongs to you, for example, an image that is copyrighted. Ransomware A form of malware, usually infecting unprotected digital systems, occurring when users open malicious email attachments. Malware A malicious form of software that is transferred to, and then executed on, a user’s machine to damage or disrupt the system or allow unauthorised access to data. Denial-of-Service (DoS) attacks Attack a remote computer by making it unable to respond to legitimate user requests. Cybersecurity The combination of policies, procedures, technologies and the actions of individuals to protect from both internal and external threats. Organisations have become reliant on digital systems to hold data and perform vital business functions. Data and information theft Many organisations have their digital systems attacked daily. Industrial Espionage Data and information both have value as they can be sold The reasons these attacks may occur are varied Intellectual property (designs, business strategy for financial gain. etc) can be stolen through organised cyberattacks. This can be done by stealing customer payment information and then using it to purchase goods These types of assets can be highly valuable, leading •Fun/ illegally. to cheaper, fake copies of products being sold and Breaches of data and information are a major cause of •challenge the original organisation suffering a loss of income. identity theft. •Data and Financial Gain Fun/ Challenge •Industrial information • Hackers may attack systems for the thrill, adrenaline espionage theft A very simple motive: money.
    [Show full text]
  • The Emergence of Exploit-As-A-Service
    Manufacturing Compromise: The Emergence of Exploit-as-a-Service Chris Grier† Lucas Ballard2 Juan Caballerox Neha Chachra∗ Christian J. Dietrichq Kirill Levchenko∗ Panayiotis Mavrommatis2 Damon McCoyz Antonio Nappax Andreas Pitsillidis∗ Niels Provos2 M. Zubair Rafiquex Moheeb Abu Rajab2 Christian Rossowq Kurt Thomasy Vern Paxson† Stefan Savage∗ Geoffrey M. Voelker∗ y University of California, Berkeley ∗ University of California, San Diego 2 Google International Computer Science Institute x IMDEA Software Institute q University of Applied Sciences Gelsenkirchen z George Mason University ABSTRACT 1. INTRODUCTION We investigate the emergence of the exploit-as-a-service model for In this work we investigate the emergence of a new paradigm: the driveby browser compromise. In this regime, attackers pay for an exploit-as-a-service economy that surrounds browser compromise. exploit kit or service to do the “dirty work” of exploiting a vic- This model follows in the footsteps of a dramatic evolution in the tim’s browser, decoupling the complexities of browser and plugin world of for-profit malware over the last five years, where host com- vulnerabilities from the challenges of generating traffic to a web- promise is now decoupled from host monetization. Specifically, the site under the attacker’s control. Upon a successful exploit, these means by which a host initially falls under an attacker’s control are kits load and execute a binary provided by the attacker, effectively now independent of the means by which an(other) attacker abuses transferring control of a victim’s machine to the attacker. the host in order to realize a profit. This shift in behavior is exem- In order to understand the impact of the exploit-as-a-service plified by the pay-per-install model of malware distribution, where paradigm on the malware ecosystem, we perform a detailed anal- miscreants pay for compromised hosts via the underground econ- ysis of the prevalence of exploit kits, the families of malware in- omy [4, 41].
    [Show full text]
  • Phishing – a Growing Threat to E-Commerce
    Phishing – A Growing Threat to E-Commerce M. Tariq Banday* and Jameel A. Qadri** * Department of Electronics & Instrumentation Technology, The University of Kashmir, Srinagar – 190006, email: [email protected]. ** School of Computing, Middlesex University, Hendon, London, UK, email: [email protected]. Abstract: In today’s business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing – a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed. This paper also highlights the latest phishing analysis made by Anti-Phishing Working Group (APWG) and Korean Internet Security Center. Introduction commerce has given a boon to both customers and Electronic Commerce (E-Commerce) is commercial businesses by driving down costs and prices. E- transactions conducted electronically especially commerce allows real-time business across using a computer over a large network like Internet. geographical borders round the clock. In developed It involves exchange of business information using countries almost all business employs e-commerce electronic data interchange (EDI), email, electronic or has e-commerce provisions and in developing bulletin boards, fax transmissions, electronic funds countries like India, it is registering a rapid growth transfer, etc. Internet shopping, online stock and in terms of both popularity among consumers and bond transactions, selling and purchase of soft the revenue generated through e-commerce merchandise like documents, graphics, music, (Vashitha–2005).
    [Show full text]
  • Spyware & Adware Products
    AdwareAdware/Spyware/Spyware ProductsProducts && RecommendationsRecommendations UCLAUCLA OfficeOffice ofof InstructionalInstructional DevelopmentDevelopment MikeMike TakahashiTakahashi AgendaAgenda WhatWhat isis AdwareAdware/Spyware/Spyware KnownKnown AdwareAdware/Spyware/Spyware ProductsProducts AntiAnti AdwareAdware/Spyware/Spyware RemovalRemoval ProductProduct ComparisonsComparisons TipsTips && RecommendationsRecommendations AdwareAdware AdwareAdware cancan bebe softwaresoftware thatthat generatesgenerates advertisementsadvertisements suchsuch asas poppop--upup windowswindows oror hotlinkshotlinks onon webweb pages.pages. ItIt maymay addadd linkslinks toto youryour favoritesfavorites andand youryour desktop.desktop. ItIt cancan changechange youryour homehome pagepage andand youryour searchsearch engineengine toto sitessites thatthat earnearn incomeincome fromfrom variousvarious advertisers.advertisers. Source http://www.microsoft.com/windows/ie/community/columns/adware.mspx AdwareAdware ExamplesExamples What?!What?! MyMy computercomputer isis infected!infected! OrOr isis it?it? AdwareAdware ExamplesExamples WellWell--knownknown AdwareAdware ProgramsPrograms toto AvoidAvoid HotbarHotbar (Add(Add--ons)ons) Adds graphical skins to Browser and Email clients Adds toolbars and search button BlockCheckerBlockChecker ClipGenieClipGenie CometComet CursorCursor GatorGator WinFixerWinFixer StumbleUponStumbleUpon WeatherBugWeatherBug SpywareSpyware SpywareSpyware isis computercomputer softwaresoftware thatthat collectscollects
    [Show full text]
  • Detection of Pharming Attack on Websites Using Svm Classifier
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 11, NOVEMBER 2019 ISSN 2277-8616 Detection Of Pharming Attack On Websites Using Svm Classifier Saloni Manhas, Swapnesh Taterh, Dilbag Singh Abstract: Attackers are constantly trying to con users and organizations to cause financial damage, loss of sensitive information, and ruin their reputation. Pharming attacks are becoming a headache for website users due to its severe consequences. This attack is achieved by stealing user’s credentials and redirect them to malicious websites by using DNS based techniques. Therefore, to give additional safety Transport Layer Security/Secure Sockets Layer (TLS/SSL) was introduced. It operates by authorizing the actual web server for you to the customer, vice a new versa in so doing each party confirming the actual reliability by using digital certificates. However, SSL is still vulnerable to pharming attacks. Results show that the proposed technique provides 97% accuracy along with high performance in F-measure, sensitivity and specificity which is commendable and proves that SVM is an adequate machine learning method to successfully carry out detection of pharming attack. Index Terms: Phishing, Support Vector Machine (SVM), Secure Socket Layer (SSL) attacks, Malicious websites, Pharming, Machine learning, Network attacks. —————————— —————————— 1. INTRODUCTION DNS cache poisoning, pharming attack is executed and It is quite evident that all of the advances seen in the leaves user facing dire consequences like password information technology realm helped both the good guys hijacking, stolen credentials etc. It is often said that HTTP and the bad. Subsequently, we have seen a steep increase should not be used to pass sensitive information.
    [Show full text]
  • Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome
    Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software comes with more or less unwanted add-ons or browser toolbars. These are quite annoying because they may: Change your homepage and your search engine without your permission or awareness Track your browsing activities and searches Display annoying ads and manipulate search results Take up a lot of (vertical) space inside the browser Slow down your browser and degrade your browsing experience Fight against each other and make normal add-on handling difficult or impossible Become difficult or even impossible for the average user to fully uninstall Toolbars are not technically not a virus, but they do exhibit plenty of malicious traits, such as rootkit capabilities to hook deep into the operating system, browser hijacking, and in general just interfering with the user experience. The industry generally refers to it as a “PUP,” or potentially unwanted program. Generally speaking, toolbars are ad-supported (users may see additional banner, search, pop-up, pop-under, interstitial and in-text link advertisements) cross web browser plugin for Internet Explorer, Firefox and Chrome, and distributed through various monetization platforms during installation. Very often users have no idea where did it come from, so it’s not surprising at all that most of them assume that the installed toolbar is a virus. For example, when you install iLivid Media Player, you will also agree to change your browser homepage to search.conduit.com, set your default search engine to Conduit Search, and install the AVG Search-Results Toolbar.
    [Show full text]
  • Informational Supplement Best Practices on Spyware Prevention and Detection the Internet Has Become a Popular Method for Both C
    Informational Supplement Best Practices on Spyware Prevention and Detection The Internet has become a popular method for both conducting business and managing finances through online banking relationships. While most financial institutions and some individuals have taken steps to protect their computers, many firewall and anti-virus software packages do not protect computers from one of the latest threats, “spyware” – a form of software that collects personal and confidential information about a person or organization without their proper knowledge or informed consent, and reports it to a third party. This informational supplement describes the various challenges and best practices related to spyware. Financial institutions should consider these recommendations to prevent and detect spyware on both bank-owned and customer computers. Spyware Infection Spyware is usually installed without a user’s knowledge or permission. However, users may intentionally install spyware without understanding the full ramifications of their actions. A user may be required to accept an End User Licensing Agreement (EULA), which often does not clearly inform the user about the extent or manner in which information is collected. In such cases, the software is installed without the user’s “informed consent.” Spyware can be installed through the following methods: • Downloaded with other Internet downloads in a practice called “bundling.” In many cases, all the licensing agreements may be included in one pop-up window that, unless read carefully, may leave the user unaware of “bundled” spyware. • Directly downloaded by users who were persuaded that the technology offers a benefit. Some spyware claims to offer increased productivity, virus scanning capabilities or other benefits.
    [Show full text]